Oftentimes, even the most extensive security systems are unable to identify and alert key employees to the presence of an APT. Therefore, IT administrators and engineers must understand what to look for in order to effectively recognize the launch of an APT, or an existing one within the network.

The emerging Internet of Everything is set to heighten the security burden for device makers, software vendors and the numerous organizations that will rely on an interconnected network of smart devices to support operations and serve customers.

The recent attacks on the New York Times; Washington Post and Federal Reserve illustrate a dangerous trend in cyber tactics. All of these institutions became victims of Island Hopping. Island Hopping has become the tactic of choice for elite hacker crews. As an information security specialist your organization is being targeted by nation states; criminals…

Have you ever almost been hit by a car crossing the street staring at your mobile? Have you ever spoken to someone without them ever looking you in the eye as they stare incessantly at their mobile? Do you feel as if you spend more time in cyberspace than in the real world? Then you are…

We have entered a brave new world in cyberspace where we are ever more dependent upon cyberspace and our electrical grid. At the same time, the energy sector is becoming more vulnerable to cyber-attack. The energy sector’s history of vulnerability began with the Blackout of August 2003. The sector responded to that blackout by following…